Got News?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

Subscribe to Vigilance Weekly

Written by ZOE DAVIES, REALWIRE IN PARTNERSHIP WITH VIGILANCE
| 19 April 2013

London, UK: Thales, leader in information systems and communications security, will be showcasing its line of high assurance data protection, mobile payments and cyber security solutions at this year’s Infosecurity Europe, 23-25 April, 2013.

Strong encryption and key management are cornerstones of today’s IT infrastructures, visit stand F30 where Thales will be demonstrating its latest solutions for:

Cloud data protection

Strong encryption and key management are recognized as the most secure and effective way of protecting data and that applies equally to the cloud as in it does the enterprise. In order for organizations to take up cloud services and migrate sensitive and high-value data to virtualized and cloud deployments, they need a high assurance, reliable key management solution that allows them to retain control of their keys, and therefore their data. The Thales portfolio protects critical data assets throughout their lifecycle – when in storage, passing over communications networks and while in use by business applications – all of which are vital aspects of a cloud security strategy. Thales is releasing the 2nd edition of its annual research report – Encryption in the Cloud. The study, produced in conjunction with the Ponemon Institute, is based on a survey of more than 4,000 business and IT managers from around the world regarding the use of encryption in the cloud.

Enterprise class key management

Thales will be demonstrating its recently launched keyAuthority 4.0 high assurance enterprise-class key management solution. The industry’s most comprehensive hardened key manager provides full support for Key Management Interoperability Protocol (KMIP), developed by the OASIS standards body. KMIP will be a critical enabler of broad enterprise key management that can span numerous encryption use cases and cryptographic applications.

Mobile commerce

The payments world is undergoing major disruption with innovations at the point of sale (POS) such as contactless card, mobile payments and mobile point of sale (mPOS). The emergence of alternative payment providers such as PayPal, Google and Square challenging banks and traditional payment acquirers; and investment in improved fraud detection such EMV card, mobile authentication technology and new approaches to reduce the burden of compliance further impacts the market environment. Thales is a world-class expert in secure transaction solutions for payments including payment processing, EMV issuance, mobile provisioning, mobile payments and PCI DSS compliance – see how our products and services secure payments in both the new and traditional payments worlds.

Secure communications

There is an ever increasing need for higher speed communications at the same time as concern is growing over security of data in transit. Additionally secure communications in government and defence comes under specific regulation with strict certification for classified networks. Thales understands this environment and has decades of experience working with national technical authorities and regulatory bodies. The Thales Datacryptor family of programmable network encryptors carries many national and international certifications, offering that special combination of high-speed network encryption for virtually any network type and flexibility to satisfy diverse regulatory environments.

Cyber security and assurance

The risk of cyber attack has increased significantly in the past 20 years. Cyber threats come in many forms and can have a significant impact on your business ranging from denial of service to significant brand damage through loss of information. Thales’ consultancy-led approach is defined by a new compliance standard and supports delivery of CESG accredited cyber security solutions. This allows customers to manage their cyber risk exposure at a level of rigour and cost appropriate to their organisation, enabling prioritisation of cyber activities and cost-effective cyber risk reduction.